Demystifying cloud cybersecurity

With the rise of edge data centres and an increase in cloud-based computing, companies are facing new challenges in end-to-end cybersecurity. To ensure proper protection, data centre teams must now assess both internal processes and strategies used by cloud suppliers....

Building a zero trust environment

People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...

AI in cybersecurity – friend or foe?

It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...
Security Terminology Demystified: The Virus Edition

Security Terminology Demystified: The Virus Edition

The file scrambler, the data hoarder and the ransom demander – ransomware isn’t fun for anyone … You’ve read our comprehensive guide to cybersecurity threats and you’ve hopefully read our inside guides to Ransomware and Malware but now it is time to delve deep...

Stand to lose everything through lack of awareness

There is growing number of attacks and almost all the successful attacks have come from an insider being compromised through deception, negligence or a lack of awareness. In this era of endless cyberattacks, companies need to attack or face being attacked and stand to...

Reclaiming the inner city with visible public CCTV

Drugs, prostitution, armed robbery, rape and hijackings are just a few of the crimes that plague the downtown streets of cities like Durban, KwaZulu-Natal. By Mark Chertkow, director at Graphic Image Technologies Within walking distance of tourist hotspots like the...